-Achieves greater security of supply by lowering risks along the supply chain. The processor in this bad boy can put some individuals PC to shame. This area is used when the client knows that the information on your computer or other device, and needs to help guide them in the right direction on how to use these data.